Toggle light / dark theme

Malware Defense: Protecting Against Polymorphic Malware

So everything we just said about metamorphic and polymorphic malware also applies to metamorphic and polymorphic ransomware.

Metamorphic and Polymorphic Malware Families

With consistent functionalities regardless of code, malware is often grouped into families so security teams can look for similar functions and code segments in efforts to protect their organizations. Some of the most well-known malware families include:

The Worm That Nearly Ate the Internet

Today, thanks to extraordinary sleuthing by the F.B.I. and some of the world’s premier cybersecurity experts, there are answers to these questions. They offer an unsettling reminder of the remarkable sophistication of a growing network of cybercriminals and nation states — and the vulnerability of not just our computers, but the internet itself.


It infected 10 million computers. So why did cybergeddon never arrive?

Credit Credit Cathryn Virginia

An AI “Vaccine” Can Block Adversarial Attacks

For as smart as artificial intelligence systems seem to get, they’re still easily confused by hackers who launch so-called adversarial attacks — cyberattacks that trick algorithms into misinterpreting their training data, sometimes to disastrous ends.

In order to bolster AI’s defenses from these dangerous hacks, scientists at the Australian research agency CSIRO say in a press release they’ve created a sort of AI “vaccine” that trains algorithms on weak adversaries so they’re better prepared for the real thing — not entirely unlike how vaccines expose our immune systems to inert viruses so they can fight off infections in the future.